Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf und unsichere Verwendung von /tmp in wu-ftpd
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf und unsichere Verwendung von /tmp in wu-ftpd
ID: DSA-016-1
Distribution: Debian
Plattformen: Debian potato
Datum: Di, 23. Januar 2001, 12:00
Referenzen: Keine Angabe
Applikationen: WU-FTPD

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

----------------------------------------------------------------------------
Debian Security Advisory DSA-016-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
January 23, 2001
----------------------------------------------------------------------------

Package : wu-ftpd
Vulnerability : temp file creation and format string
Debian-specific: no

Security people at WireX have noticed a temp file creation bug and the
WU-FTPD development team has found a possible format string bug in
wu-ftpd. Both could be remotely exploited, though no such exploit
exists currently.

We recommend you upgrade your wu-ftpd package immediately.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
------------------------------------

Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.

Source archives:

wu-ftpd_2.6.0.orig.tar.gz
MD5 checksum: 652cfe4b59e0468eded736e7c281d16f
wu-ftpd_2.6.0-5.2.dsc
MD5 checksum: a63f505372cbd5c3d2e0404f7f18576f
wu-ftpd_2.6.0-5.2.diff.gz
MD5 checksum: af6e196640d429f400810aaf016d144c

Intel ia32 architecture:

wu-ftpd_2.6.0-5.2_i386.deb
MD5 checksum: 5cdd2172e1b2459f1115cf034c91fe40

Motorola 680x0 architecture:

wu-ftpd_2.6.0-5.2_m68k.deb
MD5 checksum: 60192b7386401ddbbb4ada8776e887ec

Sun Sparc architecture:

wu-ftpd_2.6.0-5.2_sparc.deb
MD5 checksum: 4e7a1c8eb667f3ef40b858ca7833bc14

Alpha architecture:

wu-ftpd_2.6.0-5.2_alpha.deb
MD5 checksum: f5bf5286952e8812b94a692efe6308e0

PowerPC architecture:

wu-ftpd_2.6.0-5.2_powerpc.deb
MD5 checksum: 15683a1a12381aa5c9b15b108fe6a579

ARM architecture:

wu-ftpd_2.6.0-5.2_arm.deb
MD5 checksum: 0d32fa96a7eb8d42dd0216876c894335

Architecture independent:

wu-ftpd-academ_2.6.0-5.2_all.deb
MD5 checksum: 6974913b3783fedff98e65341e0464be


These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-securitydists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6bUWKW5ql+IAeqTIRAiyXAJsFm4pH5WOLkwHHsdnwcgqhiJ3vogCgqQc4
mNOMiBp9ZkOLs/0nGJKXZmw=
=xAYD
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung